![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
Intended for use in a one- or two-semester undergraduate course in operating systems for computer science, computer engineering, and electrical engineering majors Operating Systems: Internals and Design Principles provides a comprehensive and unified introduction to operating systems topics. Stallings emphasizes both design issues and fundamental principles in contemporary systems and gives readers a solid understanding of the key structures and mechanisms of operating systems. He discusses design trade-offs and the practical decisions affecting design, performance and security. The book illustrates and reinforces design concepts and ties them to real-world design choices through the use of case studies in Linux, UNIX, Android, and Windows 8. Teaching and Learning Experience This program presents a better teaching and learning experience-for you and your students. It will help: *Illustrate Concepts with Running Case Studies: To illustrate the concepts and to tie them to real-world design choices that must be made, four operating systems serve as running examples.*Easily Integrate Projects in your Course: This book provides an unparalleled degree of support for including a projects component in the course. *Keep Your Course Current with Updated Technical Content: This edition covers the latest trends and developments in operating systems. *Provide Extensive Support Material to Instructors and Students: Student and instructor resources are available to expand on the topics presented in the text.
Die Administration komplexer Rechnernetzwerke verlangt durch die standige Weiterentwicklung etablierter Standards und die Integration ganzlich neuer Technologien ein umfassendes technisches Know-how von Administratoren und Systementwicklern. Dabei ist insbesondere die Sicherheit und Verfugbarkeit aller Systemkomponenten von zentraler Bedeutung fur die Funktionsfahigkeit eines Netzes. Das vorliegende Buch gibt eine fundierte und umfassende Darstellung zentraler Techniken und nutzlicher Werkzeuge zur TCP/IP-Netzwerk-Konfiguration und -Uberwachung. Besonderes Augenmerk wird dabei auf Sicherheitsbedrohungen und deren wirksame Abwehr mittels entsprechender Netzwerkmanagement-Tools gelegt. Das Spektrum der betrachteten Technologien reicht von etablierten Netzwerkprotokollen uber den Einsatz komplexer Software-Systeme bis hin zu aktuellen Trends der drahtlosen Kommunikation und priorisierten Datenstrome des Quality of Service (QoS).
With 28 new chapters, the third edition of The Practice of System and Network Administration innovates yet again! Revised with thousands of updates and clarifications based on reader feedback, this new edition also incorporates DevOps strategies even for non-DevOps environments. Whether you use Linux, Unix, or Windows, this new edition describes the essential practices previously handed down only from mentor to protege. This wonderfully lucid, often funny cornucopia of information introduces beginners to advanced frameworks valuable for their entire career, yet is structured to help even experts through difficult projects. Other books tell you what commands to type. This book teaches you the cross-platform strategies that are timeless! DevOps techniques: Apply DevOps principles to enterprise IT infrastructure, even in environments without developers Game-changing strategies: New ways to deliver results faster with less stress Fleet management: A comprehensive guide to managing your fleet of desktops, laptops, servers and mobile devices Service management: How to design, launch, upgrade and migrate services Measurable improvement: Assess your operational effectiveness; a forty-page, pain-free assessment system you can start using today to raise the quality of all services Design guides: Best practices for networks, data centers, email, storage, monitoring, backups and more Management skills: Organization design, communication, negotiation, ethics, hiring and firing, and more Have you ever had any of these problems? Have you been surprised to discover your backup tapes are blank? Ever spent a year launching a new service only to be told the users hate it? Do you have more incoming support requests than you can handle? Do you spend more time fixing problems than building the next awesome thing? Have you suffered from a botched migration of thousands of users to a new service? Does your company rely on a computer that, if it died, can't be rebuilt? Is your network a fragile mess that breaks any time you try to improve it? Is there a periodic "hell month" that happens twice a year? Twelve times a year? Do you find out about problems when your users call you to complain? Does your corporate "Change Review Board" terrify you? Does each division of your company have their own broken way of doing things? Do you fear that automation will replace you, or break more than it fixes? Are you underpaid and overworked? No vague "management speak" or empty platitudes. This comprehensive guide provides real solutions that prevent these problems and more!
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022. The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.
This book constitutes the refereed proceedings of the 5th CCF China Blockchain Conference, CBCC 2022, held in Wuxi, China, in December 2022. The 7 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.
Accessible to the Lean novice and shop floor employee, The Basics of Line Balancing and JIT Kitting explores line balancing and the pre-assembly of components into a finished product in a just-in-time fashion (JIT Kitting). It explains how to use time studies, develop yamazumi charts, discover and eliminate waste, balance your line, and create new standard work content for the shop floor. The book facilitates a clear understanding of the seven deadly wastes (muda) as well as what you can do to eliminate them from your facility. Describing the purpose and use of standard work, it explains how to properly staff work cells and how to develop flex plans for fluctuations in demand using this data. The first few chapters explain how to determine takt time and how to use that information along with time studies to identify when you are not meeting customer demand. The chapters on JIT Kitting explain how there are other advantages to kitting besides eliminating waste and increasing productivity. The book explains how you can use JIT Kitting to improve quality by having the parts available and limiting the options of numerous parts to the operator. It also provides the understanding needed to ensure the right parts are installed, thereby correcting issues with the build of materials.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Design and Architecture for Signal and Image Processing, DASIP 2022, held in Budaypest, Hungary in June 2022. The 13 full included in the volume were carefully reviewed and selected from 32 submissions. They are organized in the following topical sections: leading signal, image and video processing and machine learning in custom embedded, edge and cloud computing architectures and systems.
"This book is a comprehensive text for the design of safety critical, hard real-time embedded systems. It offers a splendid example for the balanced, integrated treatment of systems and software engineering, helping readers tackle the hardest problems of advanced real-time system design, such as determinism, compositionality, timing and fault management. This book is an essential reading for advanced undergraduates and graduate students in a wide range of disciplines impacted by embedded computing and software. Its conceptual clarity, the style of explanations and the examples make the abstract concepts accessible for a wide audience." Janos Sztipanovits, Director E. Bronson Ingram Distinguished Professor of Engineering Institute for Software Integrated Systems Vanderbilt University Real-Time Systems focuses on hard real-time systems, which are computing systems that must meet their temporal specification in all anticipated load and fault scenarios. The book stresses the system aspects of distributed real-time applications, treating the issues of real-time, distribution and fault-tolerance from an integral point of view. A unique cross-fertilization of ideas and concepts between the academic and industrial worlds has led to the inclusion of many insightful examples from industry to explain the fundamental scientific concepts in a real-world setting. Compared to the Second Edition, new developments in communication standards for time-sensitive networks, such as TSN and Time-Triggered Ethernet are addressed. Furthermore, this edition includes a new chapter on real-time aspects in cloud and fog computing. The book is written as a standard textbook for a high-level undergraduate or graduate course on real-time embedded systems or cyber-physical systems. Its practical approach to solving real-time problems, along with numerous summary exercises, makes it an excellent choice for researchers and practitioners alike.
Dieses Buch erlautert, was hinter den aktuellen Buzzwords aus der Business-IT wirklich steckt. Dabei konzentriert es sich auf die vier wichtigen Kernthemen SOA (Service Orientierte Architekturen), BI (Business Intelligence), CRM (Customer Relationship Management) und ECM (Enterprise Content Management). Sie erfahren, welche Ziele mit diesen Technologien erreicht werden sollen, welche Komponenten daran beteiligt sind, welche Produkte der Markt anbietet und worauf Sie bei einer Einfuhrung unbedingt achten sollten. Dabei richtet sich das Buch an technisch orientierte Leser, die diese Themen von der IT-Seite her angehen. Nach einer kurzen Einfuhrung folgen die technischen Grundlagen und dazu passende praxisrelevante Beispiele. So werden etwa Datamining-Verfahren fur Business Intelligence erlautert, die mehr liefern als die banale Aussage Wer Bier kauft, kauft auch Chips." Zudem bietet dieses Buch auch einen Uberblick uber die wichtigsten Hersteller und Losungsanbieter in den jeweiligen Produktkategorien. Entscheidungshilfen und konkrete, praxisbezogenen Produktempfehlungen runden die jeweiligen Schwerpunktthemen ab.
Discover the latest information for working on Windows, Mac OS, and UNIX/Linux platforms with GUIDE TO OPERATING SYSTEMS, 5E. You examine operating system theory, installation, upgrading, configuring operating system and hardware, file systems, virtualization, security, hardware options, storage, resource sharing, network connectivity, maintenance, and troubleshooting. Easily understood and highly practical, GUIDE TO OPERATING SYSTEMS, 5E is the resource you need to deepen your understanding of different operating systems. This edition helps you understand the fundamental concepts of computer operating systems. The book specifically addresses Windows 10 and earlier Windows client OSs, Windows Server 2012 R2 and earlier Windows server OSs with a preview of Windows Server 2016, Fedora Linux, and Mac OS X El Capitan and earlier. In addition, general information prepares you to work with many other operating systems.
This book constitutes the proceedings papers of the 14th IFIP Working Conference on the Practice of Enterprise Modeling, held in Riga, Latvia, during November 24-26, 2021. PoEM offers a forum for sharing experiences and knowledge between the academic community and practitioners from industry and the public sector. This year the theme of the conference is the use of enterprise modeling and enterprise architecture towards ensuring sustainability and resilience of enterprises and societies. The 14 full and 6 short papers presented in this volume were carefully reviewed and selected from a total of 47 submissions. They were organized in topical sections named: enterprise modeling and enterprise architecture; enterprise modeling methods and method engineering; business process modeling and management; requirements engineering for privacy, security and governance; and case studies and experiences.
There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll Learn Install Salt Services on Ubuntu and CentOS based systems Work with remote execution modules Format YAML files correctly Provide defined configuration using state files Use Salt-Proxy to configure network devices Automate the configuration of Linux servers and networking devices Add value for both the server and network automation team Who This Book Is For System administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.
This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.
Harbor is a major CNCF open source project, with thousands of production users all over the world. This book provides a comprehensive explanation of the open source cloud native registry: Harbor. Written by experts who contributed to and now maintain Harbor, the content covers its architecture, principles, functions, deployment and configuration, scanning artifacts, remote replication, operation and maintenance, customized development, API usage and success stories. The book offers a valuable guide for Harbor users, developers and contributors, cloud native software development engineers, test engineers, operational and maintenance engineers, IT architects and IT technical managers. It will also benefit university students in computer-related disciplines.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations you'll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll Learn Review the basics of ARM64 assembly language Examine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patterns See how pointers in C and C++ are implemented and used Who This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
This book constitutes the revised selected papers of the 10th International Conference on Networked Systems, NETYS 2022, held as virtual event, in May 17-19, 2022. The conference was held virtually due to the COVID-19 crisis.The 18 full papers and 2 short papers presented were carefully reviewed and selected from 100 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including multi-core architectures, Concurrent and distributed algorithms, parallel/concurrent/distributed programming, distributed databases, big data applications and systems, cloud systems, networks, security, and formal verification. They were organized in topical sections as follows: Distributed System; Networking; Verification; Security.
Now in its Seventh Edition, UNDERSTANDING OPERATING SYSTEMS continues to provide a clear and straightforward explanation of operating system theory and practice. As in previous editions, the book's highly regarded structure begins with a discussion of fundamentals before moving on to specific operating systems. Fully updated, this new edition includes expanded analysis of the impact on operating systems of such innovations as multi-core processing and wireless technologies. Revised Research Topics in the exercise section encourage independent student research. The final four chapters have been updated to include information on current versions of UNIX (including the latest Macintosh OS), Linux, and Windows, and a new chapter on Android has been added.
Based on lectures given at a summer school on computer algebra, the book provides a didactic description of the facilities available in three computor algebra systems - MAPLE, REDUCE and SHEEP - for performing calculations in the algebra-intensive field of general relativity. With MAPLE and REDUCE, two widespread great-purpose systems, the reader is shown how to use currently available packages to perform calculations with respect to tetrads, co-ordinate systems, and Poincare` gauge theory. The section on SHEEP and Stensor, being the first published book on these systems, explains how to use these systems to tackle a wide range of calculations with respect to tackle a wide range of calculations in general relativity, including the manipulation of indicial formulae. For the researcher in general relativity, the book therefore promises a wide overview of the facilities available in computer algebra to lessen the burden of the lengthy, error-prone calculations involved in their research.
This open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019. Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first.
This book constitutes the refereed conference proceedings of the 29th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2022, held in Paderborn, Germany, in June 2022. The 16 full papers presented in this book were carefully reviewed and selected from 30 submissions. SIROCCO is devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities. Special emphasis is given to innovative approaches leading to better understanding of the relationship between computing and communication.
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are organized in the following topical sections: intelligent transportation systems; distributed computing for networking and communication; articial intelligence applied to cyber physical systems.
The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.
This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features. |
You may like...
Maths Progress Second Edition Core…
Katherine Pate, Naomi Norman
Paperback
R668
Discovery Miles 6 680
New Perspectives on Power and Political…
Danielle Slootjes, Harm Kaal
Hardcover
R3,466
Discovery Miles 34 660
Ambitious Antiquities, Famous Forebears…
Karl A.E. Enenkel, Konrad Adriaan Ottenheym
Hardcover
R3,504
Discovery Miles 35 040
Platinum Mathematics - Grade 4…
L. Bowie, C. Gleeson-Baird, …
Paperback
(1)R210 Discovery Miles 2 100
|